Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Security Enterprise ServicesSecurity Leadership and ManagementSecurity & Business ResilienceAccess ManagementIdentity ManagementPhysical SecurityVideo Surveillance

Making the Security Case to the C-Suite

By Greg Schreiber
Boon Edam Circlelock Security Portal with Internal Biometrics.jpg
May 27, 2020

Perhaps the most significant security advancement made at the enterprise level over the last two decades has not been technology, but rather its perception. While shiny new technology devices never fail to grab the attention of management, making the security case for purchasing them is another matter. Now that the security function is considered a key aspect of business operations in many organizations, it becomes critical to keep the C-Suite engaged.

As this current COVID-19 pandemic has illustrated, organizations that fail to properly gauge potential threats and risks to their operations can quickly fall into the abyss. Having a risk plan that challenges C-Suite executives to look beyond the technology aspects of security to a proactive situational awareness posture is a big step forward. When management reinforces and supports such proactive steps to employees and staff, it strengthens that organization and helps it to be flexible while meeting any challenge.

Make the Business Case

But how is that proactive posture achieved?

Any security program that has managed to embed its value into the organizational infrastructure has done so with a robust program of awareness and transparency. While it is a constant battle to foster a higher awareness of the real need for additional technology and security products, providing the C-Suite a transparent argument for systems expansion and additional capital spending can be difficult. Selling risk is hard.

Security directors who assume that focusing on technology in their relations with other business units and using fear tactics to try to force compliance are missing a big opportunity to convince the C-suite of security's importance. The C-Suite will recognize a security team as relevant if it is adept at managing risks to revenue streams, operations and the brand.

Although many successful security executives may have helped C-level executives move past the lament of security being nothing more than a cost center, they should continue to stress actual returns-on-investments when it comes to technology. As one global CTO, Rudy Wolter, said to me, “Senior management understands the numbers. They may not connect numbers to risk, and that is up to you to show. You have to prove ‘risk versus reward’; if they do not see the risk – and it has to be real – the C-suite will believe you are overstating the facts and you lose credibility.”

Here’s an example of describing the ROI to the C-Suite: once an intruder gets into a facility via tailgating there’s a whole world of risk and liability that opens up, ranging from theft to violence, as well as bad PR, lawsuits and regulatory fines. Security entrances can mitigate that risk of intrusion by dealing with tailgating from a deter, detect or prevent standpoint…in the end reducing the manpower needed to supervise the entry, creating a payback on the capital expenditure. These very specific features and benefits can communicate the ROI story to upper management.

Another approach to influencing the C-Suite is proposed by Paul Schuster, Senior Corporal/Project Officer, Facilities Management at the Dallas Police Department: start at the bottom and work the culture. “By making sure all employees are educated about security, you make them a part of the solution. You can expand beyond basic training to help them understand the need to limit the organization’s liability, as well as the reasoning behind implementing the technology for security layers including cameras, guards and security entrances. This will improve their engagement and increase the success of adoption. When your staff has a better understanding of these needs, the awareness will filter up through executive management to the C-Suite as well.”

The cold truth is that most C-Suite executives are not concerned about the technical profile of that new biometric reader or camera system. Management must understand the risk mitigation case of that device and how security promotes the organization’s bottom line and corporate culture. That is why it is key that security leaders understand and emphasize when new technology is low-stress and does not unduly impact staff routines. When communicating with the C-Suite, security must communicate both the costs and the benefits at the organizational level to build support.

KEYWORDS: c-suite COVID-19 pandemic risk management security equipment security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Greg schreiber
Greg Schreiber is the Senior Vice President of Sales at Boon Edam Inc. with a career that spans more than 20 years in the security entrance and door industry in a variety of sales management roles, including National Sales Manager for Boon Edam since 2007. Schreiber has successfully steered Boon Edam’s North American and Latin American sales teams to produce double-digit sales growth in each of the last five years.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Cybersecurity
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Columns
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Technologies & Solutions
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

Pills spilled

More than 20,000 sensitive medical records exposed

Laptop in darkness

Verizon 2025 Data Breach Investigations Report shows rise in cyberattacks

Coding on screen

Research reveals mass scanning and exploitation campaigns

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Computer with binary code hovering nearby

Cyberattacks Targeting US Increased by 136%

2025 Security Benchmark banner

Events

May 22, 2025

Proactive Crisis Communication

Crisis doesn't wait for the right time - it strikes when least expected. Is your team prepared to communicate clearly and effectively when it matters most?

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • turnstile

    The Top 5 Reasons the C-Suite Wants Security Entrances

    See More
  • woman enters building

    Four steps to entrance security success

    See More
  • active-directory-freepik5567.jpg

    How to convince the C-suite to buy in to active directory security

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing